💾 Archived View for gemini.spam.works › mirrors › textfiles › groups › PHONELOSERS › pla018.txt captured on 2023-01-29 at 15:06:31.

View Raw

More Information

⬅️ Previous capture (2020-11-01)

-=-=-=-=-=-=-

?018??????????????????????????????????????????????????????????????????????018?
?                    The Phone Losers Of America Present                     ?
?           The Kevin Mitnick Saga Continues... - RedBoxChiliPepper          ?
??????????????????????????????????????????????????????????????????????????????
? Written On  February 1, 1995             Last Revision on February 2, 1995 ?
?018??????????????????????????????????????????????????????????????????????018?

I kind of assumed that the Kevin Mitnick story was over back in 1990 after they
published the book "Cyberpunk." It seemed that he was reformed and his 
computer shenanagens were forever behind him but each day it seems like the
Mitnick saga gets better and better. So this is the Mitnick file. Everything
I've ever owned on Mitnick is here so enjoy it.

I know there's a lot more Mitnick articles floating around. A LOT. I used to 
have all of them (more or less) but I seem to have misplaced a few so until I
get my ass over to the university to use their computers, the following is all
you get. If you have any to contribute, please do so.
______________________________________________________________________________
The following memo is from Pacific Bell Security concerning Kevin Mitnck.

On May 14, 1987, Electronic Operations received a court order directing Pacific
Bell to place traps on the telephone numbers assigned to a company known as
"Santa Cruz Operations." The court order was issued in order to identify the
telephone number being used by an individual who was illegally entering Santa
Cruz Operations' computer and stealing information.

On May 28, 1987, a telephone number was identified five separate times making
illegal entry into Santa Cruz Operations' computer. The originating telephone
number was 805-495-6191, which is listed to Bonnie Vitello, 1378 E. Hillcrest
Drive, Apartment 404, Thousand Oaks, California.

On June 3, 1987, a search warrant was served at 1378 E. Hillcrest Drive, Apt.
404, Thousand Oaks, California. The residents of the apartment, who were not
at home, were identified as Bonnie Vitello, a programmer for General Telephone
and Kevin Mitnick, a known computer hacker. Found inside the apartment were
three computers, numerous floppy disks and a number of General Telephone
computer manuals.

Kevin Mitnick was arrested several years ago for hacking Pacific Bell, UCLA
and Huhes Aircraft company compouters. Mitnick was a minor at the time of his
arrest. Kevin Mitnick was recently arrested for compromising the data base of
Santa Cruz Operations.

The floppy disks that were seized pursuant to the search warrant revealed
Mitnick's involvement in compromising the Pacific Bell UNIX operation systems
and other data bases. The disks documented the following:

o Mitnick's compromise of all southern California SCC/ESAC computers. On file
  were the names, log-ins, passwords, and home telephone numbers for 
  northern and southern ESAC employees.
o The dial-up numbers and circuit identification documents for SCC computers
  and data kits.
o The commands for testing and seizing trunk testing lines and channels.
o The commands and log-ins for COSMOS wire centers for northern and southern
  California.
o The commands for line monitoring and the seizure of dial tone.
o References to the impersonation of southern California security agents and
  ESAC employees to obtain information.
o The commands for placing terminating and originating traps.
o The addresses of Pacific Bell locations and the electronic door lock access
  codes for the following southern California central offices ELSG12, LSAN06,
  LSAN12, LSAN15, LSAN56, AVLN11, HLWD01, HWTH01, IGWD01, LOMT11 and SNPD01.
o Inter-company electronic mail detailing new login/password proceedures and
  safeguards.
o The work sheet of an UNIX encryption reader hacker file. If successful, this
  program could break into any UNIX system at will.
______________________________________________________________________________
"Ex-Computer Whiz Kid Held on New Fraud Counts" 
by Kim Murphy (Los Angeles Times) December 16, 1988

  Kevin Mitnick was 17 when he first cracked Pacific Bell's computer system,
secretly channeling his computer through a pay phone to alter telephone bills,
penetrate other computers and steal $200,000 worth of data from a San
Francisco corporation. A juvenile court judge at the time sentenced Mitnick to
six months in a youth facility.
  [After his release,] his probation officer found that her phone had been
disconnected and the phone company had no record of it. A judge's credit record
at TRW Inc. was inexplicably altered. Police computer files on the case were
accessed from outside... Mitnick fled to Israel. Upon his return, there were
new charges filed in Santa Cruz, accusing Mitnick of stealing software under
development by Microport Systems, and federal prosecutors have a judgement
showing Mitnick was convicted on the charge. There is, however, no record of
the conviction in Santa Cruz's computer files.
  On Thursday, Mitnick, now 25, was charged in two new criminal complaints
accusing him of causing $4 million damage to a DEC computer, stealing a highly
secret computer security system and gaining access to unauthorized MCI long-
distance codes through university comoputers in Los Angeles, CA, and England.
  A United States magistrate took the unusual step of ordering Mitnick held
without bail, ruling that when armed with a keyboard he posed a danger to the
community. "This thing is so massive, we're just running around trying to
figure out what he did," said the prosecutor, an assistant United States
attorney. "This person, we believe, is very, very dangerous, and he needs to
be detained and kept away from a computer."
  Los Angeles Police Department and FBI investigators say they are only now
beginning to put together a picture of Mitnick and his alleged high-tech 
escapades. "He's several levels above what you would characterize as a computer
hacker," said detective James K. Black, head of the Los Angeles police dept's
computer crime unit. "He started our with a real driving curiousity for
computers that went beyond personal compouters...He grew with the technology."
  Mitnick is to be arraigned on two counts of computer fraud. The case is 
believed to be the first in the nation under a federal law that makes it a
crime to gain access to an interstate computer network for criminal purposes.
Federal prosecutors also obtained a court order restricting Mitnick's phone
calls from jail, fearing he might gain access to a computer over phone lines.
______________________________________________________________________________

______________________________________________________________________________
"Dark Side Hacker..." From The Los Angeles Times...
Dammit, what's the date on this article???

  When computer hacker Kevin Mitnick arrived at a Calabases parking garage for 
a meeting with his friend Lenny DiCicco four weeks ago, DiCicco reached up and
casually scratched his head, a pre-arranged signal to federal agents hiding
nearby.
  Quickly, with the sound of screeching tires and shouted commands, a half 
dozen men closed in and handcuffed Mitnick. "Len, why did you do this to me?", 
Mitnick asked as he was being led away, DiCicco recalled later.
  "Because you're a menace to society," DiCicco replied.
  Law enforcement authorities couldn't agree more.  Mitnick, 25, an overweight, 
bespectacled San Fernando Vally computer junkie known as a "dark side" hacker 
for his willingness to use the computer as a weapon, has been accused of 
causing $4 million in damage to computer giant Digital Equipment Corp in 
Massachusetts.
  Described by one investigator as a sophisticated criminal whose computer was 
an "umbilical cord to his soul," he also is charged by a federal grand jury 
with illegally copying Digital software valued at $1 million.
  But those are just the latest in a decade-long series of accusations against 
Mitnick, whose high school computer hobby turned into a lasting obsession.  
  He roved Los Angeles, allegedly using computers at schools and businesses to 
break into Defense Department computer systems, sabotage business computers 
and electronically harass anyone-including a probation officer and FBI agents 
who got in his way.  He also learned how to disrupt telephone company 
operations and disconnected the phones of Hollywood celebrities such as 
Kristy McNichol, authorities said.
  So determined was Mitnick, according to friends, that when he suspected his 
home phone was being monitored, he carried his hand-held keyboard to a pay 
phone in front of a 7-Eleven store, where he hooked it up and continued to 
break into computers around the country.
  "He's an electronic terrorist," said DiCicco. "He can ruin someone's life 
just using his fingers."
  Over the last month, three federal court judges have refused at seperate 
hearings to set bail for Mitnick, contending there would be no way to protect 
society from him if he were freed from his cell at the Metropolitan Detention 
Center in Los Angeles, where he is awaiting a February 21 trial date.
  Although there is a subculture of "whiz kids" around the country who break 
into computers for fun, and they occasionally are caught by local authorities, 
they traditionally wind up with no more than a slap on the wrist or a short 
term in jail or juvenile detention facilities, according to Jay Bloom Becker 
of the National Center for Computer Data, an information firm in Los Angeles.
  But Mitnick is being treated as anything but a prankster. Prosecutors say he 
is the first person to be charged under a tough federal interstate computer 
crime law.  He faces up to 30 years in prison if convicted of three counts.
  Mitnick's lack of conscience, authorities say, makes him even more dangerous 
than hackers such as Robert Morris Jr.
  Mitnick's motive for a decade of hacking?
  Not money, apparently.  An unemployed computer programmer, he drove a used 
car and was living with his wife in his mother's modest Panorama City 
apartment at the time of his arrest.
  "He's gotten nothing out of it except jail," said DiCicco.
  Mitnick's family and attorney however, accuse federal prosecutors of 
blowinng the case out of proportion, either out of fear or misunderstanding of 
the technology. Mitnick's wife, Bonnie, a clerk who met her future husband 
when he sent a message to her computer asking for a date, said prosecutors are 
portraying her husband as a technological magician who "could turn dogs into 
chickens."
  His mother, Shelly Jaffee, a Panorama City waitress, said her son never even 
owned a computer and is not smart enough to pull off such sopisticated crimes. 
She acknowledged that he once won a $300 prize at a fair for cracking a 
display computer's security code, but she attributed that more to luck than 
anything else.
  By all acounts, Mitnick was a bright but indistinguished boy in school,                                                                                                                                                                           
said Jaffee, who was divorced when Kevin was 3.  "He was just a normal, typical kid.  He was not a whiz kid," she said.
  In fact, Mitnick disliked school, where he was unpopular, friends said.  
Aloof and a loner, his appearance didn't help.  He acquired the much-satirized 
look of the computer fanatic: shirt tail hanging out, horn-rimmed glasses and 
pens in his breast pocket.
  "There was always something slightly out of place," said one educator who 
knew Mitnick as a student in a computer class.
  His interest in computers blossomed at Monroe High School in Sepulveda, 
where he took a programming course taught by John Christin 1979.  But Mitnick 
was not interested in writing simple programs, he wanted to learn how to 
manipulate the fundamental codes that made the computer work, Christ said.
  Soon, he was using the classroom computers, furnished by Digital Equipment 
Corp., the world's largest maker of networked computers with $11 billion in 
annual sales, to gain access to files in the Los Angeles Unified School 
District's main computers in downtown Los Angeles, Christ said.  The two 
systems were linked and Mitnick was able to discover codes that, when typed 
into the classroom system, would allow entry into the main computers.
  He didn't try to alter grades, but caused enough trouble that administrators 
asked Christ to watch him closely.  When Mitnick was caught breaking in again, 
Christ said, he showed no remorse.
  "He has no conscience as far as I can tell," the instructor said.
  DiCicco said Mitnick was already a schoolyard legend for misusing the 
computer terminal when they met.  DiCicco, who became a disciple, said 
watching Mitnick find ways into computer systems "was thrilling.  I was 
learning a lot from him."
  He may not have been on the football team, but within the subculture of 
computer hackers, Mitnick was a colorful figure, using the name "Condor," for 
a Robert Redford movie character who outwits the government.  The final digits 
of his unlisted home phone number were 007.
  Mitnick had such a special feeling for the computer that when an 
investigator for the Los Angeles County district attorney's office accused him 
of harming a computer he entered, he got tears in his eyes.  "The computer to 
him was more of an animate thing," said the investigator, Robert Ewen, "There 
was an umbilical cord from it to his soul.  That's why when he got behind a 
computer he became a giant."
  Although some teen-agers consider hacking glamorous, it atually can be a 
grinding process.  A hacker may spend hours, even days, on a home terminal, 
connected by phone to another system the hacker wants to enter.  The target 
system is usually protected by security designed to keep out unauthorized 
intruders, so the hacker often has to deduce or discover by tedious trial and 
error the secret passwords given to people authorized to use the system.
  What made Mitnick "the best," said Steven Rhoades, a fellow hacker and 
friend, was his ability to talk people into giving him privilleged 
information.  He would call an official with a company he wanted to penetrate 
and say he was in the maintenance department and needed a computer password.  
He was so convincing, they gave him the neccessary names or numbers, Rhoades 
said.
  Rhoades said he and Mitnick broke into a North American Air Defense Command 
computer in Colorado Springs, CO in 1979.  The 1983 movie "Wargames" is based 
upon a similar incident, in which a young hacker nearly starts World War III 
when he sends a message to a defense computer that is mistaken for a Soviet 
missile attack.
  But Rhoades said they did not interfere with any defense operations. "We 
just got in, looked around and got out," he said.
  At the time he was getting interested in computers, Mitnick also developed a 
fascination for the telephone system, becoming what is known as a "phone 
phreak." In 1981, when he was just 17, Mitnick and three others were arrested 
for stealing manuals while pretending to be on a guided tour of Pacific Bell's 
computer center in Los Angeles, which controlled service and repair operations 
and other functions for Southern California's phone system.
  He was prosecuted as a juvenile and placed on probation.  He violated it a 
short time later, however, by using USC computers. He was sent to a youth 
detention facility for six months, records show.
  Pacific Bell officials refuse to talk about Mitnick.  But he eventually 
learned so much that he could create phone numbers, tap into telephone calls, 
and disconnect service without leaving a trace, according to DiCicco and 
Rhoades.  He did this, according to DiCicco, by impersonating phone company 
officials, or by playing certian tones over the phone to the Pacific Bell 
computer, which then carried out pre-programmed orders.
  Ewen said Mitnick "had the ability to do anything the telephone company 
could do.  Our belief was, he could have taken the system down."
  One thing he did repeatedly, according to authorities, was disconnect phone 
service to entertainers he admired, especially McNichol, then a star of the 
television show "Family." 
  Ridgeway said Mitnick once bragged to her that he had tampered with the 
credit records of FBI agents who investigated him.
  "He had a very vindictive streak," she said. "A whole bunch of people were 
harassed.  They call me all the time."
  Even friends were not safe.  Rhoades said he once picked up his phone at 
home and heard a recorded message telling him to "please deposit 25 cents."  
DiCicco said he once found that all his company's calls were being forwarded 
to his home phone, a prank he was sure Mitnick was behind.
  Mitnick met his wife two years ago in a class at Computer Learning Center in 
Los Angeles, where he was helping to write a security program to protect the 
school's computer system against hackers.  A message suddenly appeared on her 
computer screen asking for a date.  Auburn-haired and petite, she looked over 
at him, then typed, "Sure."
  Chivalrous, he walked her to class and even carried her books.
  Mitnick's attorney, Alan Rubin, said everything he can learn about his 
client shows him to be a decent, hard-working man.  "We have a picture of him 
that is so out of line with what the government is saying," he said, shaking 
his head.
  In 1987, Mitnick broke into the systems of computer firms in Santa Cruz, 
authorities said.  He was so confident, he continued to enter The Santa Cruz 
Operation computers after officials there detected him and electronically sent 
him his own password, "hacker," so they could keep close watch on what he was 
doing.
  The company agreed not to sue him if he would tell them how he had broken 
through the security, and Computer Services Manager Steph Marr said he flew 
down to Los Angeles to meet Mitnick.  Marr said he complimented Mitnick's 
abilities with a respectful greeting.
  "Well met, well played," Marr said.  But Mitnick shrugged off the praise, 
the executive said.
  "He sort of came across as I was not fully qualified to ask him these 
things."
  Associates said Mitnick believed he was too clever to be caught. He had 
penetrated the DEC network in Massachusetts so effectively, DiCicco said, that 
he could read the personal electronic mail of security people working on the 
case of the mysterious hacker and discover just how close they were getting to 
him.
  But caught he was, again and again, often by authorities tracing the long 
distance calls needed for an outsider to tie in to acomputer.  After each 
brush with authorities, however, the lure to return to hacking was too great 
to resist, according to his friends.  His mastery of the computer, after all, 
was his "source of self esteem," said Rhoades.
  Friends say Mitnick thought of using his unusual abilities to make a living. 
He and DiCicco were planning to start a business that would advise companies 
how to keep out hackers.
  But strains developed in their relationship, according to DiCicco, when he 
tired of the "dark side" hacking.  He said he tried to get away from Mitnick, 
but his friend would search him out.
  Mitnick began visiting DiCicco at night at Voluntary Plan Administrators 
(VPA), a Calabasas firm where DiCicco worked, to use the company's computers.  
DiCicco said that when he grew sick of Mitnick's demands and finally turned 
him down, Mitnick called his boss, impersonated an IRS agent and said DiCicco                                                                                                                                       
was be investigated.
  It was one malicious prank too many.  Confronted by his boss, DiCicco 
"spilled the beans," he said.
  The FBI was called in and watched Mitnick's every move the day before his 
arrest, once recording him after he signed on the computer system at VPA.  
Mitnick dialed into Digital and into a computer system in Leeds, England, 
according to DiCicco and law enforcement officials.  DiCicco said Mitnick 
talked British professors into giving him passwords and was already halfway 
into the system when he quit after six hours of hacking.
  He had no second thoughts about turning in his former mentor. "He always 
thought he had his thumb on me," DiCicco said.
  Friends said Mitnick did it all simply for the challenge, what one computer 
expert called finding "a worthy opponent."
  The lack of a profit motive in Mitnick's hacking makes the move to hold him 
without bail repugnant to some defense attorneys. "It's crazy," said Leslie 
Abramson, president of California Attorneys for Criminal Justice in Los 
Angeles.  
  "It speaks of the vast power of prosecutors."
  But prosecutors say Mitnick is a new kind of criminal, one who can do as 
much harm with a computer terminal as a bank robber with a gun.  They say 
there is evidence he broke into the super-secret National Security Agency 
computers and that other federal charges could be filed soon.
  In addition, county authorities are reviewing evidence against both Mitnick 
and DiCicco of a possible theft of computer software at Pierce College.
  "There is a tendency to look on these things as pranks," said Deputy Dist. 
Atty. Stephen Plafker.
  "Mitnick has got enough of a history now that we can look on him as being 
really dangerous."
______________________________________________________________________________
Feds pull plug on most wanted computer hacker - February 17, 1995
Electronic Hunt nets Mitnick, 31 - From Corpus Cristi Caller Times

  RALEIGH, N.C. - Federal authorities see him as the world's most wanted
computer hacker. But to his former therapist, Kevin Mitnick is just "a sad,
lonely, angry, isolated boy" who spent more time with computers that people.
  Culminating a search that began in November 1992, federal agents arrested 
Mitnick early Wednesday at his Raleigh apartment. Mitnick, who once broke into
a top secret military defense system as a teen-age prank, allegedly pilfered
thousands of data files and at least 20,000 credit card number, worming his way
into ever the most sophisticated systems.
  A detention hearing was scheduled for this morning before a federal
magistrate. Mitnick, 31, was charged with computer fraud, punishable by 20 years
in prison, and illegal use of a telephone access device, which carries a
maximum 15-year sentence. Both crimes also are punishable by $250,000 fines.
In addition, he was wanted in California for allegedly violating probation on
a previous hacing conviction.
  "It was an intensive, two-week-long electronic manhunt that involved several
dozen law enforcement agents around the country," Assistant U.S. Attorney Kent
Walker in San Fransisco said Thursday.
  But others pooh-poohed the depiction of Mitnick as the cyberthief to beat 
all cyberthieves. "That's what I see, a sad, lonely, angry, isolated boy,"
Harriet Rosetto, Mitnick's former therapist, told the Daily News of Los
Angeles after learning of his arrest. "I don't think he's that important a
person. I think he's become mythical," said said. "That he's become public
enemy No. 1 is kind of laughable.
  "I think that had he found a way to be accepted in the mainstream, he would
have joined the mainstream," Rosetto said. "He already had this reputation as
this Svengali character. Nobody wanted to go near him."
  One of the first indicted under the Computer Security Act of 1987, Mitnick
was convicted of getting into MCI telephone computers and accessing long-
distance codes, and of causing $4 million damage to Digital Equipment Corp.
  The $4 million actually represented computer down-time, not damage, said
attorney Alan Rubin who defended Mitnick. But it was Mitnick's third conviction
and he served one year in prison. At the 1989 sentencing, U.S. District Judge
Mariana Pfaelzer ruled that Mitnick's hacing was an addiction, like drugs,
alcohol or the junk food he lived on. She agreed that he was dangerous when
armed with a computer and phone line, and ordered him to get therapy and go 
to prison.
  In therapy, Mitnick lost 100 of his nearly 300 pounds and worked on his 
self-esteem, Rosetto said. Tom Perrine, who used to develop software to 
protect classified information for the federal government, said authorities
are behind when it comes to computer hacking investigations.
  And in the end, it took someone with the skills of Tsutomu Shimomura, a 30
year old computer security soecialist at the San Diego Supercomputer Center, 
to help the federal agents track Mitnick. Shimomura's own computer at his
California beach house, which was linked to the system at the center, was hit
by the hacker on Christmas Day, said center spokeswoman Stephanie Sides.
  Incensed, Shimomura canceled a ski vacation and assembled a team of computer
experts to hunt down the intruder. They traced Mitnick to Netcom, a nationwide
Internet access provider, and with the help of federally subpoenated phone
records determined that he was placing calls from a cellular phone near 
Raleigh-Durham International Airport.
  Early Monday morning, Shimomura drove around Raleigh with a telephone
company technician. They used a cellular frequency direction-finding antenna
hooked to a laptop to narrow the search to an apartment complex. The FBI
arrested Mitnick after a 24-hour stakeout.
______________________________________________________________________________

??????????????Contact?The?Phone?Losers?Of?America?Nearest?You!????????????????
?  512-370-4680 PLA Voice Mailbox                      And PLEASE Don't Pay  ?
?  512-851-8317 Sonic Youth Systems                    For Your Fone Calls!  ?
?  618-797-2339 PLA World Headquarters Data Line                             ?     
??????????????????????????????????????????????????????????????????????????????